basharkey / CVE-2022-0847-dirty-pipe-checker
Bash script to check for CVE-2022-0847 "Dirty Pipe"
☆64Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-0847-dirty-pipe-checker
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆79Updated 10 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆65Updated 8 months ago
- ☆45Updated 5 months ago
- Simple HTTP listener for security testing☆114Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- ☆111Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆60Updated 10 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆93Updated 7 months ago
- PHP 8.1.0-dev Backdoor System Shell Script☆83Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 10 months ago
- Red Teaming tools and techniques☆47Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆104Updated 6 months ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆55Updated 8 months ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆38Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆84Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 4 months ago
- OSCP preperation and HackTheBox write ups.☆54Updated last year
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆54Updated 2 months ago
- ☆69Updated 6 months ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆44Updated last year
- Get private key passphrase (id_rsa).☆63Updated 4 months ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆162Updated last year
- Here Are Some Bug Bounty Resource From Twitter☆85Updated 6 months ago
- ☆91Updated 9 months ago
- CVE Collection of jQuery UI XSS Payloads☆115Updated last year
- Local Privilege Escalation in polkit's pkexec☆72Updated 2 years ago
- Toolset for automating common management actions used in CTF's☆36Updated 3 years ago
- Enumerate / Dump Docker Registry☆162Updated 7 months ago